Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








625 Hits in 8.0 sec

Towards More Efficient Cardinality Estimation for Large-Scale RFID Systems

Yuanqing Zheng, Mo Li
2014 IEEE/ACM Transactions on Networking  
Radio frequency identification (RFID) cardinality estimation with an accuracy guarantee is of practical importance in various large-scale RFID applications.  ...  This paper proposes a fast RFID cardinality estimation protocol, named Zero-One Estimator (ZOE). ZOE only requires 1-bit response from the RFID tags per estimation round.  ...  We implement a prototype system based on the GNU-Radio/USRP platform in concert with the WISP RFID tags. ZOE only requires slight updates to the EPCglobal C1G2 standard.  ... 
doi:10.1109/tnet.2013.2288352 fatcat:ebomufw4pbfednc6kkdfqo3mue

ZOE: Fast cardinality estimation for large-scale RFID systems

Yuanqing Zheng, Mo Li
2013 2013 Proceedings IEEE INFOCOM  
Estimating the RFID cardinality with accuracy guarantee is an important task in large-scale RFID systems. This paper proposes a fast RFID cardinality estimation scheme.  ...  We implement a prototype system using the USRP software defined radio and Intel WISP RFID tags. We also evaluate the performance of ZOE with extensive simulations.  ...  A large-scale RFID system usually consists of multiple RFID readers and a huge amount of RFID tags [23] .  ... 
doi:10.1109/infcom.2013.6566879 dblp:conf/infocom/ZhengL13 fatcat:rlkrxphgebhlhihvra5mopn2x4

Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems

Xiulong Liu, Xin Xie, Keqiu Li, Bin Xiao, Jie Wu, Heng Qi, Dawei Lu
2016 IEEE/ACM Transactions on Networking  
In large-scale RFID-enabled applications, we sometimes only pay attention to a small set of key tags, instead of all.  ...  To obtain good scalability in large-scale RFID systems, we exploit the sampling idea in the estimation process.  ...  In a large-scale RFID system containing thousands of tags, we may only care about a small subset of tags instead of all tags.  ... 
doi:10.1109/tnet.2016.2576904 fatcat:nvqushwgzrhbzcke65tf46rkwm

Clone tag detection in distributed RFID systems

Hazalila Kamaludin, Hairulnizam Mahdin, Jemal H. Abawajy, Farrukh Khan
2018 PLoS ONE  
To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches.  ...  A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public.  ...  Acknowledgments This work is sponsored by Universiti Tun Hussein Onn Malaysia under Multidisciplinary Research (MDR) Grant vote U095 and the Ministry of Education through SLAI scholarship.  ... 
doi:10.1371/journal.pone.0193951 pmid:29565982 pmcid:PMC5863942 fatcat:xwx4zicanrgtngl3r7vqd3egsu

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Ferretti, Luca, +, TPDS Feb. 2014 437-446 Databases Efficient Unknown Tag Identification Protocols in Large-Scale RFID Sys- tems.  ...  ., +, TPDS April 2014 1078-1088 Meta data A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks.  ...  Goods distribution OTrack: Towards Order Tracking for Tags in Mobile RFID Systems.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

An efficient tag search protocol in large-scale RFID systems

Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang
2013 2013 Proceedings IEEE INFOCOM  
One research issue of practical importance is to search for a particular group of tags in a large-scale RFID system.  ...  Based on this technique, we propose an iterative tag search protocol.  ...  A FAST TAG SEARCH PROTOCOL BASED ON FILTERING VECTORS In this section, we propose an Iterative Tag Search Protocol (ITSP) to solve the tag search problem in large-scale RFID systems. A.  ... 
doi:10.1109/infcom.2013.6566878 dblp:conf/infocom/ChenLMCF13 fatcat:z3pbrcwekzgk3errjvga3qeatu

An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel

Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang
2016 IEEE/ACM Transactions on Networking  
One research issue of practical importance is to search for a particular group of tags in a large-scale RFID system.  ...  Based on this technique, we propose an iterative tag search protocol.  ...  FAST TAG SEARCH PROTOCOL BASED ON FILTERING VECTORS In this section, we propose an Iterative Tag Search Protocol (ITSP) to solve the tag search problem in large-scale RFID systems.  ... 
doi:10.1109/tnet.2014.2386318 fatcat:kgonda2hkvfkxdplhuxabfavoy

Identification-free batch authentication for RFID tags

Lei Yang, Jinsong Han, Yong Qi, Yunhao Liu
2010 The 18th IEEE International Conference on Network Protocols  
Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems.  ...  For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, incurring large volume of authentication data and huge communication cost.  ...  This work is supported in part by National Natural Science Foundation of China  ... 
doi:10.1109/icnp.2010.5762764 dblp:conf/icnp/YangHQL10 fatcat:q2fco7bvnvanjbzlyo6i72cokm

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Ju-min Zhao, Ding Feng, Deng-ao Li, Wei Gong, Hao-xiang Liu, Shi-min Huo
2017 Security and Communication Networks  
The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.  ...  (CAIP) to identify all cloned tags in multireaders RFID systems.  ...  The results show that CAIP can identify all cloned tags in large-scale RFID systems fairly fast with required accuracy.  ... 
doi:10.1155/2017/8356983 fatcat:rmsd26vl4bbpfkhrodqbde2hfm

Informative counting

Wei Gong, Kebin Liu, Xin Miao, Qiang Ma, Zheng Yang, Yunhao Liu
2013 Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '13  
Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags.  ...  We design a fine-grained batch authentication scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications.  ...  This work is supported in part by the NSFC Young Scholar 61103187, National Basic Research Program of China (973) Grant No. 2011CB302705, NSFC Major Program 61190110 and the NSFC under Grant 61171067.  ... 
doi:10.1145/2491288.2491299 dblp:conf/mobihoc/GongLMMYL13 fatcat:5iynwdcd2nablhadw4nkq2xmga

Special issue on multimedia in technology enhanced learning

Zhihan Lv, Zhihan Lv
2016 Journal of Intelligent & Fuzzy Systems  
Increased networking in different scales from global to local is having a profound effect on learning and teaching.  ...  systems to the maximum extent possible.  ...  Existing RFID localization approaches rely on signal strength to measure the distance between RFID reader and tags.  ... 
doi:10.3233/jifs-169086 fatcat:ssq3bs5rdjcsrjh522qda4jijq

Managing RFID Data: Challenges, Opportunities and Solutions

Lei Xie, Yafeng Yin, Athanasios V. Vasilakos, Sanglu Lu
2014 IEEE Communications Surveys and Tutorials  
It becomes a great challenge in the information era to effectively understand human behavior, mobility and activity through the perceived RFID data.  ...  Focusing on RFID data management, this article provides an overview of current challenges, emerging opportunities and recent progresses in RFID.  ...  Based on the above idea, Kodialam et al. propose a fast and reliable estimation mechanisms for tag size in a practical approach [25] .  ... 
doi:10.1109/surv.2014.022614.00143 fatcat:dmqiy5uutne53iqljc5pgobd6i

A survey of RFID privacy approaches

Marc Langheinrich
2008 Personal and Ubiquitous Computing  
A bewildering number of proposals have offered solutions to the privacy problems inherent in RFID communication.  ...  This article tries to give an overview of the currently discussed approaches and their attributes.  ...  Acknowledgments The feedback of the anonymous reviewers, as well as the many helpful comments from my co-editor Sarah Spiekermann, helped tremendously in the writing of this article.  ... 
doi:10.1007/s00779-008-0213-4 fatcat:6eqyljuqczdivl6cucnjjazmna

Top-k queries for multi-category RFID systems

Xiulong Liu, Keqiu Li, Jie Wu, Alex X. Liu, Xin Xie, Chunsheng Zhu, Weilian Xue
2016 IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications  
In this paper, we propose a Top-k Query (TKQ) protocol and a technique that we call Segmented Perfect Hashing (SPH) for optimizing TKQ.  ...  Specifically, TKQ is based on the framed slotted Aloha protocol. Each tag responds to the reader with a Single-One Geometric (SOG) string using the ON-OFF Keying modulation.  ...  Similarly, Zheng et al. proposed the PET protocol for tree-based RFID systems [10] .  ... 
doi:10.1109/infocom.2016.7524576 dblp:conf/infocom/LiuLWLXZX16 fatcat:r5uo6swmrjbvbnpfrkbxs6qype

Tag Estimation Method for ALOHA RFID System Based on Machine Learning Classifiers

Lea Dujić Rodić, Ivo Stančić, Kristina Zovko, Toni Perković, Petar Šolić
2022 Electronics  
The work presented in this paper provides a use-case feasibility analysis of the implementation of ML algorithms for the estimation of ALOHA-based frame size in the RIFD Gen2 system.  ...  In the last two decades, Radio Frequency Identification (RFID) technology has attained prominent performance improvement and has been recognized as one of the key enablers of the Internet of Things (IoT  ...  In large-scale infrastructures, such as commercial warehouses, reading RFID tags, such as ultra-highfrequency ones, comes at a high cost and can involve a large volume of data [2] .  ... 
doi:10.3390/electronics11162605 fatcat:q7in7hvzrzbffhtjo7pg7e55ba
« Previous Showing results 1 — 15 out of 625 results